Which of the following scenarios violates the Isolation property in the ACID properties of a transaction?Â
In I/O scheduling, which of the following algorithms minimizes seek time but may lead to starvation of requests at the ends of the disk?Â
Which of the following design patterns violates the Open/Closed Principle of SOLID principles in object-oriented design?Â
Recursion uses
What is the primary benefit of implementing Continuous Integration (CI) in a software development lifecycle?Â
Which of the following HTTP methods is idempotent and used to completely replace a resource on the server?Â
Which of the following best describes the main advantage of a Management Information System (MIS)?
Which is/are correct w.r.t Passive attacks
- Which type of attack allows an attacker to inject malicious scripts into a trusted website to execute in a victim's browser?
- Which of the following statements about Constructors in Object-Oriented Programming is correct?